Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Security Forem
Close
Posts
Relevant
Latest
Top
Comprehensive Study Guide: CompTIA 2.4 Security+ SY0-701 - Malware and Attack Vectors
Andrew Despres
Andrew Despres
Andrew Despres
Follow
Feb 24
Comprehensive Study Guide: CompTIA 2.4 Security+ SY0-701 - Malware and Attack Vectors
#
comptia
#
securityplus
#
beginners
#
cybersecurity
Comments
Add Comment
4 min read
Identity Is the New SOC: Why Security Monitoring Is Shifting to IAM
Sunny Sinha
Sunny Sinha
Sunny Sinha
Follow
Feb 24
Identity Is the New SOC: Why Security Monitoring Is Shifting to IAM
#
iam
#
soc
#
identity
#
cybersecurity
Comments
Add Comment
3 min read
Building a Confidential Web3 Application with Oasis
Zerod0wn Gaming
Zerod0wn Gaming
Zerod0wn Gaming
Follow
Feb 19
Building a Confidential Web3 Application with Oasis
#
news
#
ethics
#
networksec
#
tools
Comments
Add Comment
2 min read
Your SaaS Apps Are the New Active Directory And Nobody Is Governing Them
Sunny Sinha
Sunny Sinha
Sunny Sinha
Follow
Feb 16
Your SaaS Apps Are the New Active Directory And Nobody Is Governing Them
#
activedirectory
#
iam
#
saas
#
identity
Comments
Add Comment
3 min read
Security Is About Making the Safe Path the Easy Path
Serguey Asael Shinder
Serguey Asael Shinder
Serguey Asael Shinder
Follow
Feb 6
Security Is About Making the Safe Path the Easy Path
#
discuss
#
beginners
#
ethics
#
networksec
Comments
Add Comment
1 min read
Soft-Skill Attacks: How Social Engineering Bypasses Security Controls
JuicyScore
JuicyScore
JuicyScore
Follow
Feb 5
Soft-Skill Attacks: How Social Engineering Bypasses Security Controls
#
discuss
#
education
#
networksec
Comments
Add Comment
4 min read
Security Is About Failing Safely
Serguey Asael Shinder
Serguey Asael Shinder
Serguey Asael Shinder
Follow
Feb 5
Security Is About Failing Safely
#
discuss
#
beginners
#
networksec
Comments
Add Comment
1 min read
Inside AMD SEV: How memory encryption works today(and where it is lacking)
Oluwaseun Olajide
Oluwaseun Olajide
Oluwaseun Olajide
Follow
Feb 3
Inside AMD SEV: How memory encryption works today(and where it is lacking)
#
discuss
#
aws
#
cryptography
#
cloudsecurity
Comments
Add Comment
3 min read
Inside AMD SEV: How memory encryption works today(and where it is lacking)
Oluwaseun Olajide
Oluwaseun Olajide
Oluwaseun Olajide
Follow
Feb 3
Inside AMD SEV: How memory encryption works today(and where it is lacking)
#
azure
#
aws
Comments
Add Comment
3 min read
🔄 January: Patch & Vulnerability Management — Fix the Gaps Before Attackers Exploit Them
Amit Ambekar
Amit Ambekar
Amit Ambekar
Follow
Feb 3
🔄 January: Patch & Vulnerability Management — Fix the Gaps Before Attackers Exploit Them
#
cybersecurity
#
vulnerability
#
exploit
#
cyber
Comments
Add Comment
2 min read
Security Is About Reducing Blast Radius
Serguey Asael Shinder
Serguey Asael Shinder
Serguey Asael Shinder
Follow
Feb 3
Security Is About Reducing Blast Radius
#
discuss
#
beginners
#
networksec
Comments
Add Comment
1 min read
Security Fails Quietly, Not Dramatically
Serguey Asael Shinder
Serguey Asael Shinder
Serguey Asael Shinder
Follow
Feb 2
Security Fails Quietly, Not Dramatically
#
discuss
#
beginners
#
networksec
Comments
Add Comment
1 min read
Security Is a Process, Not a Feature
Serguey Asael Shinder
Serguey Asael Shinder
Serguey Asael Shinder
Follow
Feb 4
Security Is a Process, Not a Feature
#
discuss
#
beginners
#
education
#
networksec
1
reaction
Comments
Add Comment
1 min read
Why Zero Trust Is Failing Without Identity Governance
Sunny Sinha
Sunny Sinha
Sunny Sinha
Follow
Feb 2
Why Zero Trust Is Failing Without Identity Governance
#
identity
#
cybersecurity
#
saas
#
zerotrust
Comments
Add Comment
3 min read
OAuth Consent Phishing
Daniel Isaac E
Daniel Isaac E
Daniel Isaac E
Follow
Feb 2
OAuth Consent Phishing
#
azure
#
beginners
#
education
#
networksec
1
reaction
Comments
Add Comment
1 min read
What Is AI Inference Governance? The new definition.
Jaclyn McMillan
Jaclyn McMillan
Jaclyn McMillan
Follow
Jan 24
What Is AI Inference Governance? The new definition.
#
discuss
#
riskmanagement
#
compliance
#
ethics
Comments
Add Comment
3 min read
CompTIA Security+ SY0-701 2.2 Study Guide: Threat Vectors and Social Engineering
Andrew Despres
Andrew Despres
Andrew Despres
Follow
Jan 24
CompTIA Security+ SY0-701 2.2 Study Guide: Threat Vectors and Social Engineering
#
comptia
#
securityplus
#
beginners
#
cybersecurity
Comments
Add Comment
4 min read
We Built POOM: A Pocket-Sized Multitool for Wi-Fi 5 GHz, BLE, Zigbee & NFC
Y M
Y M
Y M
Follow
Jan 22
We Built POOM: A Pocket-Sized Multitool for Wi-Fi 5 GHz, BLE, Zigbee & NFC
#
iot
#
homelab
#
wireshark
#
pentesting
Comments
Add Comment
1 min read
loading...
Share. Secure. Succeed
Log in
Create account